Threshold schnorr with stateless deterministic signing from standard assumptions
Schnorr's signature scheme permits an elegant threshold signing protocol due to its linear
signing equation. However each new signature consumes fresh randomness, which can be …
signing equation. However each new signature consumes fresh randomness, which can be …
CycleFold: Folding-scheme-based recursive arguments over a cycle of elliptic curves
A Kothapalli, S Setty - Cryptology ePrint Archive, 2023 - eprint.iacr.org
This paper introduces CycleFold, a new and conceptually simple approach to instantiate
folding-scheme-based recursive arguments over a cycle of elliptic curves, for the purpose of …
folding-scheme-based recursive arguments over a cycle of elliptic curves, for the purpose of …
Revisiting the nova proof system on a cycle of curves
Nova is an efficient recursive proof system built from an elegant folding scheme for (relaxed)
R1CS statements. The original Nova paper (CRYPTO'22) presented Nova using a single …
R1CS statements. The original Nova paper (CRYPTO'22) presented Nova using a single …
Improving line-point zero knowledge: two multiplications for the price of one
Recent advances in fast protocols for vector oblivious linear evaluation (VOLE) have
inspired a family of new VOLE-based lightweight designated-verifier NIZK protocols (Weng …
inspired a family of new VOLE-based lightweight designated-verifier NIZK protocols (Weng …
Pianist: Scalable zkrollups via fully distributed zero-knowledge proofs
In the past decade, blockchains have seen various financial and technological innovations,
with cryptocurrencies reaching a market cap of over 1 trillion dollars. However, scalability is …
with cryptocurrencies reaching a market cap of over 1 trillion dollars. However, scalability is …
Replicated state machines without replicated execution
This paper introduces a new approach to reduce end-to-end costs in large-scale replicated
systems built under a Byzantine fault model. Specifically, our approach transforms a given …
systems built under a Byzantine fault model. Specifically, our approach transforms a given …
A tutorial on the interoperability of self-sovereign identities
Self-sovereign identity is the latest digital identity paradigm that allows users, organizations,
and things to manage identity in a decentralized fashion without any central authority …
and things to manage identity in a decentralized fashion without any central authority …
Verifiable encodings for secure homomorphic analytics
S Chatel, C Knabenhans, A Pyrgelis… - arXiv preprint arXiv …, 2022 - arxiv.org
Homomorphic encryption, which enables the execution of arithmetic operations directly on
ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations …
ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations …
Dew: transparent constant-sized zkSNARKs
We construct polynomial commitment schemes with constant sized evaluation proofs and
logarithmic verification time in the transparent setting. To the best of our knowledge, this is …
logarithmic verification time in the transparent setting. To the best of our knowledge, this is …
: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup
We present Testudo, a new FFT-less SNARK with a near linear-time prover, constant-time
verifier, constant-size proofs and a square-root-size universal setup. Testudo is based on a …
verifier, constant-size proofs and a square-root-size universal setup. Testudo is based on a …